CN112735024A - Theft prevention method, theft prevention device, theft prevention computer device and storage medium - Google Patents

Theft prevention method, theft prevention device, theft prevention computer device and storage medium Download PDF

Info

Publication number
CN112735024A
CN112735024A CN201910973719.6A CN201910973719A CN112735024A CN 112735024 A CN112735024 A CN 112735024A CN 201910973719 A CN201910973719 A CN 201910973719A CN 112735024 A CN112735024 A CN 112735024A
Authority
CN
China
Prior art keywords
article
information
picture
handover
face feature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910973719.6A
Other languages
Chinese (zh)
Inventor
卓俞安
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jincheng Sanying Precision Electronics Co ltd
Original Assignee
Jincheng Sanying Precision Electronics Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jincheng Sanying Precision Electronics Co ltd filed Critical Jincheng Sanying Precision Electronics Co ltd
Priority to CN201910973719.6A priority Critical patent/CN112735024A/en
Priority to US16/669,654 priority patent/US10878670B1/en
Publication of CN112735024A publication Critical patent/CN112735024A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G3/00Alarm indicators, e.g. bells
    • G07G3/003Anti-theft control
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F11/00Coin-freed apparatus for dispensing, or the like, discrete articles
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • G06Q20/208Input by product or record sensing, e.g. weighing or scanner processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G1/00Cash registers
    • G07G1/0036Checkout procedures
    • G07G1/0045Checkout procedures with a code reader for reading of an identifying code of the article to be registered, e.g. barcode reader or radio-frequency identity [RFID] reader
    • G07G1/0054Checkout procedures with a code reader for reading of an identifying code of the article to be registered, e.g. barcode reader or radio-frequency identity [RFID] reader with control of supplementary check-parameters, e.g. weight or number of articles
    • G07G1/0063Checkout procedures with a code reader for reading of an identifying code of the article to be registered, e.g. barcode reader or radio-frequency identity [RFID] reader with control of supplementary check-parameters, e.g. weight or number of articles with means for detecting the geometric dimensions of the article of which the code is read, such as its size or height, for the verification of the registration
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19639Details of the system layout
    • G08B13/19645Multiple cameras, each having view on one of a plurality of scenes, e.g. multiple cameras for multi-room surveillance or for tracking an object by view hand-over
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19665Details related to the storage of video surveillance data
    • G08B13/19671Addition of non-video data, i.e. metadata, to video stream
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2405Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
    • G08B13/2408Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using ferromagnetic tags
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2465Aspects related to the EAS system, e.g. system components other than tags
    • G08B13/248EAS system combined with another detection technology, e.g. dual EAS and video or other presence detection system

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Business, Economics & Management (AREA)
  • Automation & Control Theory (AREA)
  • Computer Security & Cryptography (AREA)
  • Electromagnetism (AREA)
  • Health & Medical Sciences (AREA)
  • Accounting & Taxation (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Biology (AREA)
  • Finance (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Geometry (AREA)
  • Evolutionary Computation (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • General Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Library & Information Science (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The invention provides an article anti-theft method, an article anti-theft device, a computer device and a storage medium, wherein the method comprises the following steps: acquiring a first picture of an article taken by a person in a preset area, identifying article information and face feature information in the picture, and storing the information in a preset database; acquiring a second picture of a hand-over flow of the person carrying the article, identifying article information and face feature information in the second picture, and searching the face feature information matched with the face feature information in the second picture and article information corresponding to the face feature information in a database; judging whether the article information in the second picture is consistent with the article information corresponding to the face information searched in the database; if the two are consistent, judging whether the handover process is finished, if so, eliminating an alarm device on the article, and if not, sending an anti-theft prompt message; and if not, sending a prompt message. The method can prevent the articles from being lost under the condition of manual operation loopholes.

Description

Theft prevention method, theft prevention device, theft prevention computer device and storage medium
Technical Field
The invention relates to the field of article theft prevention, in particular to an article theft prevention method, an article theft prevention device, a computer device and a computer storage medium.
Background
At present, articles are displayed in a market or a warehouse in an open exhibition stand mode, and the displayed articles can be provided with an anti-theft device such as an induction magnetic buckle and an induction bar code for preventing theft. After the customers select the needed articles in the shopping malls and the warehouses, the customers go to the cash desk for payment, and after the cash registers remove the anti-theft devices arranged on the articles after the payment is finished, the customers can take the articles out of the shopping malls or the warehouses. Normally, if the guest does not pay, the anti-theft device on the article cannot be removed, and if the customer takes the article out of the store, the alarm device is triggered. However, in some special cases, if the cashier and the customer are combined to steal the article in the store or warehouse, the cashier can remove the anti-theft device installed on the article without paying money, and then the customer takes the article out of the store or warehouse. In this case, economic losses in the store or warehouse are caused.
Disclosure of Invention
In view of the above, there is a need for an article theft prevention method and apparatus, a computer apparatus, and a computer storage medium, which can prevent article from being lost even if the article theft prevention is a human operation bug.
A first aspect of the present application provides an article surveillance method applied in a preset area where an article is stored, the article being provided with an alarm device, the method comprising:
acquiring a first picture of an article taken by a person in the preset area, identifying article information in the picture and face feature information of the person, and correspondingly storing the face feature information and the article information to a preset database;
acquiring a second picture of the handover process of the person carrying the article in the preset area, identifying article information and face feature information in the second picture, and searching the face feature information matched with the face feature information in the second picture and the article information corresponding to the matched face feature information in the database;
judging whether the article information in the second picture is consistent with the article information corresponding to the face information searched in the database;
if the two-dimensional data are consistent, judging whether the handover process is finished, if the handover process is finished, eliminating an alarm device on the article, and if the handover process is not finished, sending an anti-theft prompt message;
and if not, sending a prompt message.
Preferably, the preset area includes any one of a store and a warehouse.
Preferably, the step of determining whether the handover procedure is completed includes:
acquiring the behavior characteristics of the person in the second picture, and judging whether the behavior characteristics are handover behaviors;
if yes, determining whether a handover item in the handover process is completed, wherein the handover item comprises any one of a payment item and an audit item;
if the handover item in the handover flow is determined to be not completed, sending the anti-theft prompt message;
and if the anti-theft prompt information is finished, the anti-theft prompt information is not sent.
Preferably, the step of determining whether the behavior feature is a handover behavior includes:
identifying a behavior feature map of the person in the second picture by using a human behavior identification algorithm;
determining the action of the person represented by the behavior characteristic diagram of the person according to the behavior characteristic diagram of the person;
if the personnel act as any one of a payment action or an ex-warehouse hand-over action, the behavior characteristic is a hand-over behavior.
Preferably, when the preset area is a warehouse, the method for determining whether the handover item in the handover procedure is completed includes:
searching whether the warehouse-out record of the warehouse contains warehouse-out information of the article, and confirming whether the article information in the warehouse-out information is consistent with the article information in the second picture;
and when the article information in the ex-warehouse information is consistent with the article information in the second picture, determining that the handover item in the handover flow is completed.
Preferably, when the preset area is a shop, the method for determining whether a handover item in the handover procedure is completed includes:
according to a money collection mode, whether the money collection information of the store contains a money collection record of the article is searched;
if the collection mode in the collection records is non-cash payment, inquiring whether the collection information of the store contains the collection records of the articles, and determining that the handover item in the handover process is finished when the collection information contains the collection records of the articles;
and if the collection mode in the collection record is cash payment, acquiring the number of newly added cash in the denomination area through sensors positioned in different denomination areas in the cashier desk, acquiring the amount of the received cash according to the denomination of the cash and the number of the newly added cash, and determining that the handover item in the handover flow is finished when the amount of the received cash is equal to the price of the article.
Preferably, if the handover procedure is completed, the method further includes:
and searching the inventory record of the preset area, and modifying the inventory record information of the articles in the inventory record.
A second aspect of the present application provides an article surveillance device, the device comprising:
the first acquisition module is used for acquiring a first picture of an article taken by a person in the preset area, identifying article information in the picture and face feature information of the person, and correspondingly storing the face feature information and the article information to a preset database;
the second acquisition module is used for acquiring a second picture of a handover process of the person carrying the article in the preset area, identifying article information and face feature information in the second picture, and searching the face feature information matched with the face feature information in the second picture and article information corresponding to the matched face feature information in the database;
the judging module is used for judging whether the article information in the second picture is consistent with the article information corresponding to the face information searched in the database;
the first execution module is used for judging whether the handover process is finished or not when the article information in the second picture is consistent with the article information corresponding to the face information searched in the database, eliminating an alarm device on the article if the handover process is finished, and sending an anti-theft prompt message if the handover process is not finished;
and the second execution module is used for sending a prompt message when the article information in the second picture is consistent with the article information corresponding to the face information searched in the database.
A third aspect of the application provides a computer arrangement comprising a processor for implementing the article surveillance method as previously described when executing a computer program stored in a memory.
A fourth aspect of the present application provides a computer storage medium having stored thereon a computer program which, when executed by a processor, implements the article surveillance method as described above.
The article anti-theft method, the device, the computer device and the storage medium can automatically identify the picture of the article taken by the person entering the preset area and the picture of the article taken by the person entering the preset area, and judge whether the taken article completes the handover process, such as the payment process or the ex-warehouse audit process, or not by identifying the characteristic information in the picture. And if the fact that the article taken by the personnel is not completed in the handover process is determined, article anti-theft prompt information is sent out, so that article loss caused by manual operation holes is avoided.
Drawings
Fig. 1 is a schematic diagram of an application environment architecture of an article anti-theft method provided by the present invention.
Fig. 2 is a flow chart of an article anti-theft method provided by the invention.
Fig. 3 is a schematic structural diagram of an article surveillance device provided by the present invention.
FIG. 4 is a schematic diagram of a computer device according to the present invention.
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, a detailed description of the present invention will be given below with reference to the accompanying drawings and specific embodiments. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth to provide a thorough understanding of the present invention, and the described embodiments are merely a subset of the embodiments of the present invention, rather than a complete embodiment. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention.
Fig. 1 is a schematic view of an application environment architecture of the article anti-theft method according to the present invention.
The article anti-theft method is applied to a computer device 1, and the computer device 1 and at least one camera device 2 are in communication connection through a network. The network may be a wired network or a Wireless network, such as radio, Wireless Fidelity (WIFI), cellular, satellite, broadcast, etc.
The computer device 1 may be an electronic device installed with article surveillance software, such as a desktop computer, a personal computer, a server, and the like, wherein the server may be a single server, a server cluster, a cloud server, or the like.
The image pickup device 2 is an electronic apparatus having a photographing function, and includes, but is not limited to, a camera, a video camera, a monitoring camera, and the like. The camera device 2 is located in the preset area and used for shooting pictures of people entering the preset area and pictures of articles in the preset area taken by the people. The camera device 2 may be a panoramic camera device in a preset area, a mobile shooting device which moves along with entering of people in the preset area, or a plurality of monitoring cameras which are located in different positions in the preset area.
Please refer to fig. 2, which is a flowchart illustrating an article surveillance method according to the present invention. The order of the steps in the flow chart may be changed and some steps may be omitted according to different needs.
And step S1, acquiring a picture of an article in a preset area picked up by a person acquired by a first camera device, identifying article information in the picture and face feature information of the person, and correspondingly storing the face feature information and the article information.
In an embodiment of the present invention, the preset area includes any one of a shop and a warehouse, and an alarm device is mounted on an article in the preset area, and the alarm device may be a magnetic buckle mounted on the article, or an anti-theft note, an anti-theft bar code, or the like. The first camera device is located beside an article in the preset area and used for collecting images of people taking the article, wherein the images contain face information of the people and the article information.
The computer device 1 receives the image which is obtained by the first camera device and has the face information of the person and the article information, identifies the face feature information and the article information in the image by using an image identification method based on a neural network, and stores the face feature information and the article information in a database in a corresponding mode, wherein the storage format can be face feature-article name-article number. In one embodiment, the storage format may be represented by a combination of characters, numbers and/or letters, for example, the format in which the facial feature information and the item information are stored correspondingly is a01-AB1-X, where a01 is the facial feature information, AB1 is the name of the item taken by the person, and X is the number of items taken by the person. For example, if the person has taken multiple items at the same time, wherein a first item has taken one item and a second item has taken two items, the data corresponding to the first item taken by the person is stored as A01-AB1-01 and the data corresponding to the second item is stored as A01-AB 2-02.
And step S2, acquiring at least one picture of a hand-over flow of the person carrying the article in the preset area, acquired by the second camera device, identifying the article name in the at least one picture of the hand-over flow and the face feature information of the person, and comparing the article information with the article information acquired by the first camera.
In an embodiment of the present invention, when the preset area is not a shopping mall, the second camera device is located at a cash register of the shopping mall and is configured to obtain pictures of the items to be paid and the people carrying the items. In another embodiment of the present invention, when the preset area is a warehouse, the second camera device is located at a warehouse exit of the warehouse and is used for acquiring pictures of articles to be taken out of the warehouse and persons carrying the articles to handle the handover procedure.
The computer device 1 acquires at least one picture acquired by a second camera device, wherein the picture carries an article handing-over flow in a preset area, the face feature information of the person is acquired from the at least one picture, article information corresponding to the face feature information matched with the face feature information is searched in the database, whether the article information exists or not is searched in the at least one picture acquired by the second camera device according to the article information, and whether the article information is consistent with that acquired by the first camera device or not is judged. Wherein the item information includes an item name, an item number.
For example, the computer device 1 stores a picture of a commodity taken by zhang san in a shop, which is acquired by the first camera device, and recognizes face feature information of zhang san in the picture and commodity information taken by zhang san, which is a mobile phone in Hua mate30 and a watch. The computer device 1 stores the human face feature information and the commodity information of Zhang III in a database, wherein one mobile phone taken by Zhang III is stored as A02-MF1-01, and one watch taken by Zhang III is correspondingly stored as A02-EW 1-01. When three people carry the mobile phone and the watch to go to a shopping mall and a cashier desk for settlement, the computer device 2 obtains a plurality of pictures which are obtained by the second camera device and are located at the cashier desk for settlement, firstly identifies the face feature information of the pictures in the plurality of pictures, and searches the article information which is correspondingly stored by the face feature information in the database according to the identified face feature information. The item numbers are MF1 and EW1, and the number of the items is one. And identifying the items MF1 and EW1 from the plurality of pictures acquired by the second camera device according to the item numbers, and confirming whether the number of the items is consistent with that acquired by the first camera device.
And step S3, if the item is consistent with the item, judging whether the handover process is completed, if the handover process is completed, eliminating an alarm device on the item, and if the handover item is not completed, sending an anti-theft prompt message.
In an embodiment of the present invention, the method for determining whether the handover procedure is completed may include:
acquiring the behavior characteristics of the person in the second picture, judging whether the behavior characteristics are handover behaviors, and if so, determining that the handover process is completed;
wherein, the handover process comprises any one of a payment process and an audit process.
The step of judging whether the behavior feature is a handover behavior comprises:
identifying a behavior feature map of the person in the second picture by using a human behavior identification algorithm;
determining the action of the person represented by the behavior characteristic diagram of the person according to the behavior characteristic diagram of the person;
if the personnel act as any one of a payment action or an ex-warehouse hand-over action, the behavior characteristic is a hand-over behavior.
In an embodiment, when the preset area is a warehouse, the method for determining whether a handover item in the handover procedure is completed may include:
searching whether the warehouse-out record of the warehouse contains warehouse-out information of the article, and confirming whether the article information in the warehouse-out information is consistent with the article information in the second picture;
and when the article information in the ex-warehouse information is consistent with the article information in the second picture, determining that the handover item in the handover flow is completed.
In another embodiment, when the preset area is a store, the method for determining whether a handover item in the handover procedure is completed may include:
according to a money collection mode, whether the money collection information of the store contains a money collection record of the article is searched;
if the collection mode in the collection records is non-cash payment, inquiring whether the collection information of the store contains the collection records of the articles, and determining that the handover item in the handover process is finished when the collection information contains the collection records of the articles;
and if the collection mode in the collection record is cash payment, acquiring the number of newly added cash in the denomination area through sensors positioned in different denomination areas in the cashier desk, acquiring the amount of the received cash according to the denomination of the cash and the number of the newly added cash, and determining that the handover item in the handover flow is finished when the amount of the received cash is equal to the price of the article.
In another embodiment of the present invention, if the handover procedure is completed, the method may further include:
and searching the inventory record of the preset area, and modifying the inventory record information of the articles in the inventory record.
For example, the item to be paid for the third year is determined to be identical to the item acquired by the first camera device by the determination method in step S2. The computer device 1 searches for the money receiving items of the store, and if three money is paid in a non-cash mode such as a credit card, a two-dimensional code payment mode, a bus card, a shopping value storage card and the like, inquires whether the money receiving account of the store contains the money receiving records of three purchased articles. And if the third piece adopts cash payment, receiving the number of the newly added cash in the denomination area obtained by the sensors in different denomination areas in the cash desk, and obtaining the amount of the received cash according to the denomination and the number of the newly added cash. If Zhang III has finished paying, remove the alarm device on the article, and revise the stock record of the said shop, revise the quantity in the warehouse of the said article. And if the payment is not finished by Zhang III, sending a prompt message. The prompt message can inform workers in the preset area in a loud, telephone, short message and other modes.
And step S4, if the data are not consistent, a prompt message is sent.
In an embodiment of the present invention, after determining that the name of the article in the picture acquired by the second camera is different from the name of the article acquired by the first camera, a prompt message is sent, and the prompt message may notify the staff in the preset area through a ring, a telephone, a short message, and the like.
Fig. 2 above describes the article surveillance method of the present invention in detail, and functional modules of a software device for implementing the article surveillance method and a hardware device architecture for implementing the article surveillance method are described below with reference to fig. 3-4.
It is to be understood that the embodiments are illustrative only and that the scope of the claims is not limited to this configuration.
Fig. 3 is a structural diagram of the preferred embodiment of the article surveillance device of the present invention.
In some embodiments, the article surveillance device 10 operates in a computer device. The computer device is connected with a plurality of user terminals through a network. The article surveillance device 10 may include a plurality of functional modules composed of program code segments. The program codes of the respective program segments in the article surveillance device 10 may be stored in a memory of a computer device and executed by the at least one processor to implement article surveillance functions.
In this embodiment, the article surveillance device 10 may be divided into a plurality of functional modules according to the functions performed by the article surveillance device. Referring to fig. 3, the functional modules may include: a first obtaining module 101, a second obtaining module 102, a judging module 103, a first executing module 104, and a second executing module 105. The module referred to herein is a series of computer program segments capable of being executed by at least one processor and capable of performing a fixed function and is stored in memory.
The first obtaining module 101 is configured to obtain a first picture of an article taken by a person in the preset area, identify article information in the picture and face feature information of the person, and store the face feature information and the article information in a preset database correspondingly.
A second obtaining module 102, configured to obtain a second picture of a handover procedure performed by the person carrying the object in the preset area, identify object information and face feature information in the second picture, and search, in the database, for face feature information matched with the face feature information in the second picture and object information corresponding to the matched face feature information.
And the judging module 103 is configured to judge whether the article information in the second picture is consistent with the article information corresponding to the face information found in the database.
A first executing module 104, configured to determine whether a handover procedure is completed when the item information in the second picture is consistent with the item information corresponding to the face information found in the database, eliminate an alarm device on the item if the handover procedure is completed, and send an anti-theft prompt message if the handover procedure is not completed.
And the second execution module 105 is configured to send a prompt message when the item information in the second picture is consistent with the item information corresponding to the face information found in the database.
FIG. 4 is a diagram of a computer device according to a preferred embodiment of the present invention.
The computer device 1 comprises a memory 20, a processor 30 and a computer program 40, such as an article surveillance program, stored in the memory 20 and executable on the processor 30. The processor 30, when executing the computer program 40, implements the steps of the above-mentioned article anti-theft method embodiments, such as the steps S1-S4 shown in fig. 2. Alternatively, the processor 30 executes the computer program 40 to implement the functions of the modules/units in the above-mentioned embodiment of the article surveillance device, such as the units 101 and 105 in fig. 3.
Illustratively, the computer program 40 may be partitioned into one or more modules/units that are stored in the memory 20 and executed by the processor 30 to implement the present invention. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, the instruction segments describing the execution process of the computer program 40 in the computer apparatus 1. For example, the computer program 40 may be divided into a first obtaining module 101, a second obtaining module 102, a determining module 103, a first executing module 104, and a second executing module 105 in fig. 3.
The computer device 1 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. It will be appreciated by a person skilled in the art that the schematic diagram is merely an example of the computer apparatus 1, and does not constitute a limitation of the computer apparatus 1, and may comprise more or less components than those shown, or some components may be combined, or different components, for example, the computer apparatus 1 may further comprise an input and output device, a network access device, a bus, etc.
The Processor 30 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. The general purpose processor may be a microprocessor or the processor 30 may be any conventional processor or the like, the processor 30 being the control center of the computer device 1, various interfaces and lines connecting the various parts of the overall computer device 1.
The memory 20 may be used for storing the computer program 40 and/or the module/unit, and the processor 30 implements various functions of the computer device 1 by running or executing the computer program and/or the module/unit stored in the memory 20 and calling data stored in the memory 20. The memory 20 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the computer apparatus 1, and the like. In addition, the memory 20 may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
The modules/units integrated with the computer device 1 may be stored in a computer-readable storage medium if they are implemented in the form of software functional units and sold or used as separate products. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and which, when executed by a processor, may implement the steps of the above-described embodiments of the method. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
In the embodiments provided in the present invention, it should be understood that the disclosed computer apparatus and method can be implemented in other ways. For example, the above-described embodiments of the computer apparatus are merely illustrative, and for example, the division of the units is only one logical function division, and there may be other divisions when the actual implementation is performed.
In addition, functional units in the embodiments of the present invention may be integrated into the same processing unit, or each unit may exist alone physically, or two or more units are integrated into the same unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional module.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. The units or computer means recited in the computer means claims may also be implemented by the same unit or computer means, either in software or in hardware. The terms first, second, etc. are used to denote names, but not any particular order.
Finally, it should be noted that the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.

Claims (10)

1. An article antitheft method applied to a preset area for storing articles, the articles being provided with an alarm device, the method comprising:
acquiring a first picture of an article taken by a person in the preset area, identifying article information in the picture and face feature information of the person, and correspondingly storing the face feature information and the article information to a preset database;
acquiring a second picture of the handover process of the person carrying the article in the preset area, identifying article information and face feature information in the second picture, and searching the face feature information matched with the face feature information in the second picture and the article information corresponding to the matched face feature information in the database;
judging whether the article information in the second picture is consistent with the article information corresponding to the face information searched in the database;
if the two-dimensional data are consistent, judging whether the handover process is finished, if the handover process is finished, eliminating an alarm device on the article, and if the handover process is not finished, sending an anti-theft prompt message;
and if not, sending a prompt message.
2. The article theft prevention method according to claim 1, wherein the preset area includes any one of a shop and a warehouse.
3. The method of claim 1, wherein the step of determining whether the handover procedure is completed comprises:
acquiring the behavior characteristics of the person in the second picture, and judging whether the behavior characteristics are handover behaviors;
if yes, determining whether a handover item in the handover process is completed, wherein the handover item comprises any one of a payment item and an audit item;
if the handover item in the handover flow is determined to be not completed, sending the anti-theft prompt message;
and if the anti-theft prompt information is finished, the anti-theft prompt information is not sent.
4. The method of claim 3, wherein the step of determining whether the behavior feature is a handover behavior comprises:
identifying a behavior feature map of the person in the second picture by using a human behavior identification algorithm;
determining the action of the person represented by the behavior characteristic diagram of the person according to the behavior characteristic diagram of the person;
if the personnel act as any one of a payment action or an ex-warehouse hand-over action, the behavior characteristic is a hand-over behavior.
5. The article surveillance method of claim 3, wherein when the predetermined area is a warehouse, the method of determining whether the handover item in the handover process is completed comprises:
searching whether the warehouse-out record of the warehouse contains warehouse-out information of the article, and confirming whether the article information in the warehouse-out information is consistent with the article information in the second picture;
and when the article information in the ex-warehouse information is consistent with the article information in the second picture, determining that the handover item in the handover flow is completed.
6. The article surveillance method of claim 3, wherein when the predetermined area is a shop, the method of determining whether the handover item in the handover process is completed comprises:
according to a money collection mode, whether the money collection information of the store contains a money collection record of the article is searched;
if the collection mode in the collection records is non-cash payment, inquiring whether the collection information of the store contains the collection records of the articles, and determining that the handover item in the handover process is finished when the collection information contains the collection records of the articles;
and if the collection mode in the collection record is cash payment, acquiring the number of newly added cash in the denomination area through sensors positioned in different denomination areas in the cashier desk, acquiring the amount of the received cash according to the denomination of the cash and the number of the newly added cash, and determining that the handover item in the handover flow is finished when the amount of the received cash is equal to the price of the article.
7. The method of claim 6, wherein if the handover procedure is completed, the method further comprises:
and searching the inventory record of the preset area, and modifying the inventory record information of the articles in the inventory record.
8. An article surveillance device, the device comprising:
the first acquisition module is used for acquiring a first picture of an article taken by a person in the preset area, identifying article information in the picture and face feature information of the person, and correspondingly storing the face feature information and the article information to a preset database;
the second acquisition module is used for acquiring a second picture of a handover process of the person carrying the article in the preset area, identifying article information and face feature information in the second picture, and searching the face feature information matched with the face feature information in the second picture and article information corresponding to the matched face feature information in the database;
the judging module is used for judging whether the article information in the second picture is consistent with the article information corresponding to the face information searched in the database;
the first execution module is used for judging whether the handover process is finished or not when the article information in the second picture is consistent with the article information corresponding to the face information searched in the database, eliminating an alarm device on the article if the handover process is finished, and sending an anti-theft prompt message if the handover process is not finished;
and the second execution module is used for sending a prompt message when the article information in the second picture is consistent with the article information corresponding to the face information searched in the database.
9. A computer device, characterized by: the computer arrangement comprises a processor for implementing the item theft protection method according to any one of claims 1-7 when executing a computer program stored in a memory.
10. A computer storage medium having a computer program stored thereon, characterized in that: the computer program, when executed by a processor, implements an article surveillance method according to any one of claims 1-7.
CN201910973719.6A 2019-10-14 2019-10-14 Theft prevention method, theft prevention device, theft prevention computer device and storage medium Pending CN112735024A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910973719.6A CN112735024A (en) 2019-10-14 2019-10-14 Theft prevention method, theft prevention device, theft prevention computer device and storage medium
US16/669,654 US10878670B1 (en) 2019-10-14 2019-10-31 Method for protecting product against theft and computer device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910973719.6A CN112735024A (en) 2019-10-14 2019-10-14 Theft prevention method, theft prevention device, theft prevention computer device and storage medium

Publications (1)

Publication Number Publication Date
CN112735024A true CN112735024A (en) 2021-04-30

Family

ID=74039973

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910973719.6A Pending CN112735024A (en) 2019-10-14 2019-10-14 Theft prevention method, theft prevention device, theft prevention computer device and storage medium

Country Status (2)

Country Link
US (1) US10878670B1 (en)
CN (1) CN112735024A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114627430A (en) * 2021-12-30 2022-06-14 东莞先知大数据有限公司 Taking takeout detection method and device and storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11810168B2 (en) * 2021-04-02 2023-11-07 Toshiba Global Commerce Solutions Holdings Corporation Auditing mobile transactions based on symbol cues and transaction data

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100282841A1 (en) * 2009-05-07 2010-11-11 Connell Ii Jonathan H Visual security for point of sale terminals
CN106815959A (en) * 2017-01-09 2017-06-09 白逸飞 supermarket anti-theft method and system
CN108010227A (en) * 2017-12-14 2018-05-08 西安理工大学 A kind of self-service system based on the identification of more commodity
CN108109293A (en) * 2018-01-03 2018-06-01 深圳正品创想科技有限公司 A kind of commodity anti-theft settlement method, device and electronic equipment
CN108229965A (en) * 2018-01-03 2018-06-29 深圳正品创想科技有限公司 A kind of commodity anti-theft settlement method, device and electronic equipment
CN108269371A (en) * 2017-09-27 2018-07-10 缤果可为(北京)科技有限公司 Commodity automatic settlement method, device, self-service cashier
CN109345360A (en) * 2018-11-23 2019-02-15 青岛海信智能商用***股份有限公司 Unmanned shop theft preventing method and device

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7246745B2 (en) * 2004-02-27 2007-07-24 Evolution Robotics Retail, Inc. Method of merchandising for checkout lanes
US9602778B2 (en) * 2012-12-12 2017-03-21 Sensormatic Electronics, LLC Security video system using customer regions for monitoring point of sale areas
US9135499B2 (en) * 2013-03-05 2015-09-15 Tyco Fire & Security Gmbh Predictive theft notification for the prevention of theft
US9916561B2 (en) * 2013-11-05 2018-03-13 At&T Intellectual Property I, L.P. Methods, devices and computer readable storage devices for tracking inventory
US20150269549A1 (en) * 2014-03-20 2015-09-24 Toshiba Global Commerce Solutions Holdings Corporation Synchronizing scan activity with loss prevention cameras
US11482082B2 (en) * 2016-09-18 2022-10-25 Ncr Corporation Non-scan loss verification at self-checkout terminal
JP2018136731A (en) * 2017-02-22 2018-08-30 東芝テック株式会社 Information processing device and program

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100282841A1 (en) * 2009-05-07 2010-11-11 Connell Ii Jonathan H Visual security for point of sale terminals
CN106815959A (en) * 2017-01-09 2017-06-09 白逸飞 supermarket anti-theft method and system
CN108269371A (en) * 2017-09-27 2018-07-10 缤果可为(北京)科技有限公司 Commodity automatic settlement method, device, self-service cashier
CN108010227A (en) * 2017-12-14 2018-05-08 西安理工大学 A kind of self-service system based on the identification of more commodity
CN108109293A (en) * 2018-01-03 2018-06-01 深圳正品创想科技有限公司 A kind of commodity anti-theft settlement method, device and electronic equipment
CN108229965A (en) * 2018-01-03 2018-06-29 深圳正品创想科技有限公司 A kind of commodity anti-theft settlement method, device and electronic equipment
CN109345360A (en) * 2018-11-23 2019-02-15 青岛海信智能商用***股份有限公司 Unmanned shop theft preventing method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114627430A (en) * 2021-12-30 2022-06-14 东莞先知大数据有限公司 Taking takeout detection method and device and storage medium

Also Published As

Publication number Publication date
US10878670B1 (en) 2020-12-29

Similar Documents

Publication Publication Date Title
JP6869340B2 (en) Order information determination method and equipment
US20210407267A1 (en) Theft prediction and tracking system
CN109920174B (en) Book borrowing method and device, electronic equipment and storage medium
CA3043118A1 (en) Order information determination method and apparatus
US20150269549A1 (en) Synchronizing scan activity with loss prevention cameras
US9311668B2 (en) Determining to audit a customer utilizing analytics
JP5313053B2 (en) Merchandise management apparatus, merchandise management apparatus control method, and merchandise management system
US20160283922A1 (en) Information processing device, information processing method, information processing program, and storage medium storing information processing program
CN113077299A (en) Order processing method, device, equipment and storage medium
CN107644332B (en) Method, device and system for detecting whether user steals articles and intelligent equipment
CN112735024A (en) Theft prevention method, theft prevention device, theft prevention computer device and storage medium
JPWO2019171572A1 (en) Self-checkout system, purchased product management method and purchased product management program
CN112765584B (en) Two-dimensional code terminal verification and cancellation management method, device and equipment
CN214955304U (en) Reminder device and reminder device management system
CN108171286B (en) Unmanned selling method and system
US20230351318A1 (en) Commodity change information generation method and apparatus, commodity sorting method and apapratus, and electronic device
CN112308020B (en) Method, device and system for tracking off-cabinet state of nonstandard commodity
CN111383405A (en) Vending processing method, system and device and cash registering processing method and device
TWI715244B (en) Article anti-theft method, device, computer device and storage medium
CN107316413B (en) Payment method, payment device, storage medium and electronic equipment
US20140214599A1 (en) Completing A Purchase Transaction At Various Locations
CN113935669A (en) Article management method, device and system and reminding device
KR20060081991A (en) System for selling goods using cellular phone equipped with rfid reader and method thereof
CN110085035B (en) Method for searching parking position of unlicensed vehicle in parking lot and related device
KR102650648B1 (en) Apparatus for displaying sales data and Method Thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210430

WD01 Invention patent application deemed withdrawn after publication